We provide IT Staff Augmentation Services!

Infrastructure Technical Lead Resume

5.00/5 (Submit Your Rating)

SUMMARY:

  • Microsoft Certified Enterprise Administrator Expert
  • Microsoft Certified Modern Desktop Administrator Associate
  • Over 18 years of extensive experience in designing and supporting enterprise - level IT infrastructures and developing end-user solutions
  • Designed Modern Device Management standards, guidelines, and models for use by architects and delivery teams
  • Developed and designed action plans, WBS, technology roadmaps, and defined future state capabilities for clients with the accent on Azure Cloud consumptions
  • Designed and implemented multiple End-user Computing, Device Management, and Infrastructure projects for enterprise clients.
  • Forward-thinking technology leader with strong communication, management, analytical, and interpersonal skills
  • As an IT enthusiast and hobbyist, developed multiple tools and applications for IT professionals and SCCM administrators to Support Azure AD, Intune and SCCM Managed devices

AREAS OF EXPERTISE;

Active Directory Domain Services, Group Policy, DNS, DHCP

Azure AD, AD Connect, Security and Identity services

Infrastructure management and monitoring, SCCM, SCOM, OMS, Orchestrator

Intune, CSP’s, Baselines, Autopilot, CMG

M365 Administration

Windows Defender, ATP, Conditional Access

PKI Infrastructure, NAC, Condition Access, Remote Access, VPN always-on, MFA

Windows and Windows Server Operating Systems

Windows Kiosk, Single app / multi-app. Point of Sale

Configuration Management, Computer object life cycle, Patching Solutions.

Desktop Hardware, Imaging, Design, Provisioning, BIOS configuration, Bitlocker (MBAM), LAPS.

Application delivery models, App-v, Packaging

PowerShell, C#, VB.net, VBScript

Infrastructure Technical Architect

PROFESSIONAL EXPERIENCE:

Confidential

Infrastructure Technical Lead

Responsibilities:

  • Designed a new Active Directory OU Structure to support migration and provide more flexibility in objects and policy management going forward.
  • Implemented a new Windows patching process. Implemented 3rd party product patching Avanti.
  • Introduced new patching process and schedules, patching for 3rd party products.
  • Configured and introduce Windows 10 Servicing rings.
  • Created Multiple Workstation engineering standards and processes.
  • Designed Group Policy objects for windows 10.
  • Designed and implemented Local Admin Access control in the environment.
  • Designed Bit-Locker administration thorough MBAM implementation.
  • Implemented Nomad content sharing solution.
  • Created multiple KIOSK provisioning solutions.
  • Dramatically improved SCCM infrastructure and all its components.
  • Certificate management for Wi-Fi networks and Edge client secure networks.
  • Kiosk VPN tunnels. Metered connection configuration and setup.
  • Designed Windows10 migration task sequence and roll-out approaches.
  • Removed login script altogether for Windows 10. All points were substituted with GP Preferences.
  • Designed migration methods from windows 7 to windows 10. Side-by-Side, Wipe-and-Load, Bare Metal refresh. Migration design includes legacy BIOS to UEFI migration with automated bios configuration changes and repartitioning.
  • Created over 20 readiness checks before migration. Created QA scripts for Windows 10 Provisioning
  • Created a Health-Check solution to make sure that migration is successful. Including the estimated time of migration to Windows 10.
  • Designed and implemented User State Migration (USM) methods for multiple purposes. Redundancy, backups, slow networks. USM includes custom-designed migration points, such as Chrome settings, printers, and internal applications.
  • Customized Windows 10 images to support internal applications, file types, custom settings, user layouts, default programs.
  • Configured new Windows 10 features, such as Secure Boot and Device Guard.
  • Created automated computer object move during windows 10 upgrade.
  • Re-designed application provisioning process and Application Catalog in SCCM

Solutions and Technical Architect / IT Technical Lead

Confidential

Responsibilities:

  • Completely redesigned SCCM 2012 architecture to best suit company geographically distributed clients. The new design includes the ability to serve internet and intranet clients with content and collect remote computer configurational data.
  • Developed and executed an enterprise workstation imaging/deployment methodology for Windows 7 and Windows 10.
  • Implemented Local Account Password Solution (LAPS). A technical solution to manage local account passwords of domain-joined computers.
  • Redesigned user and computer group policies/preferences as per Microsoft's best practices. Replaced logon scripts with designed preferences.
  • Implemented a monthly patch strategy for desktop computers and servers. Implemented After patching Health check processes for Server and Desktop operations teams.
  • Implemented app metering standards for corporate license tracking and automatic un-used licensed application removal from client computers.
  • Implemented standards on application configuration and deployment.
  • Implemented standards on naming security groups, group policies, corporate applications, groups, collections.
  • Designed and implemented new workstation deployment processes and standards with SCCM. Including domain, off-domain/workgroup, intranet, and internet clients.

Sr. Server Support Engineer

Confidential

Responsibilities:

  • Completed full implementation of SCOM 2012 R2 as a geographically distributed highly available monitoring tool for all Windows servers (over 1200 Servers), applications, and critical business processes. IT
  • Operations teams across the world using one centralized monitoring system to monitor performance, availability, and security for all Windows servers and business applications.
  • Architected, designed, and implemented SCCM 2012R2 as a highly available and geographically distributed application.
  • Configured and implemented automated Desktop/ Server patching with the dynamic collection and group assignment. Implemented "tattooing and assignment" models for asset dynamic grouping.
  • Architected and implemented automated server and Desktop build processes. Created IT processes for deploying and decommissioning computer assets.
  • Implemented Performance statistic gathering that allowing the OPS team to understand if there are any issues, find bottlenecks and create a predictive growth statistic of resources.
  • Implemented Self-healing processes for important OS services, infrastructure application services, and processes.
  • Implemented and configured the System Center Advisor for Pro-Active Server problems/issues resolutions.
  • Implemented Compliance settings in SCCM2012 for a better understanding of server and workstation configuration deviation from corporate standards.
  • Configured Advisor working with SCOM and SCCM directly. Patched all servers that Advisor suggested with hotfixes from SCCM for all Operating systems. This resolved many OS system issues, such as unplanned shutdowns, "Gray Server", "server will not boot after patching".
  • Configured advisor to work with Exchange, Lync, SQL, etc. Provided server operation teams with understandings of misconfigured infrastructure applications; for example, missing exchange backups.
  • Configured software metering and software library for servers to better understand what applications have been installed on workstations and how they are being used.
  • Configured automatic incident ticket creation from SCOM and SCCM alerts. Improved data center service performance by improving resolution time through best practice-driven alerting, service-level monitoring, and reporting.
  • Proactive monitoring IT service Health. Increase the speed of access to information and functionality to drive management with efficient problem identification and actions to quickly resolve issues before they become incidents.
  • Task Automation. Automated routine tasks such as Intel server configuration. Automate the task of health checking and automatically remediate issues, such as automatic services restart, which will increase the overall health of the environment and will improve the server patching process.
  • Provided hardware-level management for HP ProLiant, Integrity, and HP 9000 servers, HP Blade System. Implement the Version Control Repository for the rapid delivery of the new firmware, software, and drivers to the systems.
  • Integrate with HP Insight Remote Support Advanced, which provides contracts and warranty management, and automates remote support with part delivery on site.

Sr. Server Support Engineer

Confidential

Responsibilities:

  • Managed the technology planning and execution of migration critical medical applications for Alberta Health Services to a new redundant/high availability system (60 appl, including clinical Databases)
  • Participated in Calgary Health Region migration into Alberta Health Services; Planned and performed Intel Servers migration, User migration, File - Print Migration.
  • Implement strategies for proactive and complete Intel Server systems monitoring for AHS; including monitoring software, data sources, health-check scripts, restart procedures.
  • Worked cooperatively with AHS architects to implement new / upgrade old systems at AHS such as Hospital security systems, parking systems, bed-tracking, and paging systems.
  • Designed solutions for AHS corporate anti-virus migration to a new Endpoint protection system; performed a migration of critical systems.
  • Strategically negotiated with multiple vendors to structure existing contracts and successfully established communication between them; as an example, in case of a hardware failure - which team is responsible for which item to get an issue resolved in a minimum amount of time.
  • Directed physical Server systems upgrades, including the massive rollout of new software/firmware to all Intel systems.
  • Guided routine system migrations, software/ OS upgrades and server decommissions.
  • Implemented standards for Print Server build - Print Queue and Print port creation/migration/troubleshooting; designed a complete process on How-To for desk side.
  • Demonstrated subject matter expertise in dealing with and managing concerns related to Active Directory.
  • Manage overall systems infrastructure, which includes engineering implementation, integration, and technical services and support
  • Carry out design, implementation, installation, maintenance, and administration of infrastructures including hardware, software, and various configurations based on business

Server Support Engineer

Confidential

Responsibilities:

  • Installed and configured Windows Servers for multiple Oil and Gas projects.
  • Monitored all aspects of system performance in the environment.
  • Rebuilt, renamed and replaced servers with secure data migration. Migrated Physical to Physical, Physical to Virtual.
  • Set up and configured Performance Logs and Alerts. Set up scheduled tasks for monitoring work.
  • Supported SAV environment; installed, configured, and troubleshoot SAV clients on servers.
  • Creating standard Net-backup policies and taking a backup of the servers. Restoring the data as per the customer's request.
  • Troubleshoot and replaced any hardware problems; hard drives, memory modules, system boards, and other hardware.
  • Troubleshoot client access to servers, shares, print shares. Resolving all existing problems by completing all the necessary paperwork.
  • Managed printing in the environment.
  • Configured HBA cards, attached SAN disks.

IT Engineer

Confidential

Responsibilities:

  • Evaluated all donated computer systems (servers and workstations).
  • Refurbish and prepare equipment for redeployment.
  • Imaged, tested, configured, and deployed workstations for customer networks.
  • Maintained all serial numbers and inventory assets and records in the asset management system.

We'd love your feedback!